iDefense reported that research by Sean Larsson found additional flaws.

The security bugs include several within the software's libwpd library that can be exploited to cause a heap-based buffer overflow and allow the execution of arbitrary code. This flaw requires action by the user, such as by opening a "specially crafted WordPerfect document," according to a Secuniaadvisory.

Also on the list of bugs was a boundary error that could cause a stack-based buffer overflow through the opening of a similar document.

The third type of flaw is associated with shell meta characters that are not correctly escaped. This vulnerability can be exploited to inject and execute arbitrary shell commands through a malicious document or link.

Secunia reported these vulnerabilities as "highly critical," meaning that they can be exploited for remote code execution.

Red Hat also issued an update for OpenOffice that fixes the flaws. In an advisory released today, the Red Hat Security Response Team said the update has "important security impact."

Get SC Media delivered to your inbox

Whitepaper of the Day

Newswire

Buzz

I would like to receive relevant information via email from Haymarket Media.

SC Media arms cybersecurity professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.